Security. Identity. Mobility.

Transcription

1 Security. Identity. Mobility.

2 About Us Shifra is a value added distributor founded in 2007 out of Dubai Internet City with a partner network covering the Middle East region. Shifra provides expertise to enterprise customers around the Middle East in three main areas: Information Security, Identity Protection and Enterprise Mobility. The name Shifra originates from the word Sifr, the Arabic numeral zero which was later used to describe a cipher that then created a coded message, thus forming the basis of encryption as we know it today. With an extensive experience in channel development for multi-national vendors the Shifra team has the perfect aptitude to understand the needs of the market and satisfy them. Our team consists of information technology experts that hold a cumulative experience of over 100 years in the field. Shifra professionals bring international experience from across the world; the US, Europe, Asia and the Middle East region.

5 security Advanced Defense Systems The goal of the Corero First Line of Defense security layer is to protect the customer s network infrastructure, online services and confidential data against DDoS attacks. Corero solutions are designed to be always on providing automatic attack mitigation with continuous threat visibility and network forensics. The Corero First Line of Defense solution provides comprehensive, real-time DDoS protection against the latest breed of attacks, including network and application layer DDoS attacks, volumetric, multi-vector attacks and access attempts from IP addresses with a bad reputation or from unwanted geo-locations. These varied cyber-threats have the potential to challenge traditional network security defenses and compromise networks. Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative First Line of Defense DDoS protection solutions. Corero SmartWall Threat Defense System provides: real-time protection against a continuously evolving spectrum of DDoS attacks that have the potential to impact any Internet connected business; opportunity to enhance defense-in-depth security architectures with an important additional layer of security capable of inspecting traffic arriving from the Internet and alerting and or blocking attack traffic before it impacts your environment. ENTERPRISE SERVICE PROVIDER ENTERPRISE SERVICE PROVIDER SERVICE PROVIDER ENTERPRISE ENTERPRISE SERVICE PROVIDER ENTERPRISE HOSTING PROVIDERS & DATA CENTERS ENTERPRISE ENTERPRISE ENTERPRISE HOSTED SITES CO/LO PRIVATE CLOUDS The SmartWall Network Threat Defense Appliance can be deployed to protect both infrastructure and cloud resources 3

10 security Incident Response Platform Resilient Systems provide an incident response platform which is collaborative with workflows, intelligence and deep-data analytics to react better, faster and smarter to threats or incidents. Incident Response Platform produces and manages instant incident response plans. Together with its Security and Privacy modules, it provides IR teams with best-practice action plans and flexible workflows. It's also agile, allowing teams to modify their response to suit organizational needs, and continues to adapt in real time as incidents evolve. Solutions: Security Module Resilient s Security Module offers a powerful foundation for response planning, management, and mitigation. Its dynamic actions plans, automated intelligence feeds, and comprehensive reporting make big teams teams better, and small teams big. It houses best practices on how to deal with nearly every type of incident, providing a dynamic instruction set that can lead a team through the most effective path to respond. The Resilient platform can easily be customized to support an organization's unique requirements without requiring specialized skills or programming expertise. Privacy Module Based on an industry-leading knowledgebase of global regulatory requirements, Resilient s Privacy Module provides an instant, highly customizable platform for breach preparation, assessment, and management turning a lengthy, tedious, and expensive process to one that is efficient, compliant, and always up to date. Action Module Resilient's Action Module provides an automatic, fast, and flexible way for organizations to act on incidents. It synthesizes data from detection, ticketing, and forensic systems to provide critical real-time information so that teams respond better and faster. Organizations can fine-tune and streamline response processes without custom development or specialized programming skills. Prepare Run simulations to train the team Escalate events from existing systems 8 Assess Manage Mitigate Enrich and evaluate events against Best practices Regulatory requirements Threat intelligence Coordinate efforts Assign tasks Share incident status Report on progress Take action and refine process Implement mitigation Document performance Conduct postmortems

11 identity Identity management is one of the most important components of any organization's security infrastructure. In any organization information assets must be accessible only to individuals who are granted explicit entitlements to specific information. Shifra has a strong IAM solutions portfolio which will help to set and improve the mechanisms by which organization digitally identifies individuals, assigns privileges, monitors access and data usage, maintains separation of duties, and provides end-to-end audit-ability of this infrastructure. Solutions we provide: Strong Authentication Secure Online Banking Privileged Access Management Single Sign On Identity-as-a-Service (IDaaS) Ideal Lifecycle Management 9

14 identity Identity and Access Management Evidian offers a complete, integrated and modular solution for digital identity management and access governance compatible with their security policies and the new regulatory requirements. Solutions: Enterprise Single Sign-On Strong passwords with no password-typing Enterprise SSO for mobile Solution for Android SSO and IOS SSO Web access management Portal security and web single sign-on Evidian sectoral approach offers organizations from all sectors an implementation of solutions that is adapted to each profession. For Evidian identity and access management is a major building block to ensure the security of information systems. To get the full benefit of it, the identity and access management system must gain adhesion from users and professions and offer tools for technical managers that are adapted to new usage scenarios and to the development of cloud services. 12

17 mobility Controller-less Wi-Fi and Cloud-enabled Networking for the Enterprise Aerohive is an innovative enterprise mobility company. Aerohive solutions enable enterprises to leverage the power of mobility to increase productivity, engage customers and grow their business. Companys proprietary mobility platform utilizes the cloud and a distributed, controller-less architecture to deliver unified, intelligent, simplified networks that can be cost-effectively deployed. The scalability and flexibility of the platform makes enterprise mobility available to organizations regardless of their level of IT resources and enables a consistent network architecture to be deployed across enterprises of all sizes. Mobility has become too complicated for many organizations and to address this Aerohive has focused on simplifying enterprise mobility with cloud-managed, unified mobility platform and built out a broad, integrated platform that includes: A complete, mobility-centric network access infrastructure including Controller-less Wi-Fi, access switches, branch routers, and client management agents Cloud-based management that dramatically simplifies IT operations Mobility applications that capture important contextual end-user data from our mobility platform and provide new business insights and analytic capabilities Products: Access Points Routers Switches Network Management Cloud Services Platform Applications 15

18 mobility Wi-Fi Hotspot Management Cloud4Wi provides an innovative cloud Wi-Fi platform for managing and monetizing Wi-Fi services. Cloud4Wi s platform enables venues to be rewarded for Wi-Fi services offered to customers by providing access to the world s first Wi-Fi marketplace. It includes every tool that venues need to manage and monetize their Wi-Fi services. Using an easily customizable splash portal and powerful proximity, advertising, social media and analytics applications, venues can engage their customers and generate additional revenues over their Wi-Fi network. Solutions: Wi-Fi Hotspot Management Engaging Marketing Apps Powerful Analytics Leading telecommunications and networking players, system integrators and Wi-Fi vendors have chosen Cloud4Wi to better serve their most demanding and enterprising customers who are searching for ways to maximize and/or offset their Wi-Fi investments. 16

McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business

Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,

White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

Synchronized Security and Security Heartbeat Revolutionizing Advanced Threat Protection George Kouimintzis NSS Commercial Director 1 What we re going to cover What s the problem? It s time for a security

TOP 3 Reasons to Give Insiders a Unified Identity Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous,

The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent

Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable

Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture

A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide

Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle

White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats

MANAGED SECURITY SERVICES LEVEL 3 SECURE ACCESS AND MOBILITY SERVICES BY 2015 IT IS EXPECTED THAT THE WORLD S MOBILE WORKER POPULATION WITH REACH 1.3 BILLION OR 37.2% OF THE TOTAL GLOBAL WORKFORCE. (IDC

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an

Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting

McAfee - Overview Anthony Albisser Channel Account Manager About McAfee Founded in 1987, McAfee is now the world s largest dedicated security company (acquired by Intel in 2011) Global research for real-time

WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central

Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

Enterprise Security Solutions World-class technical solutions, professional services and training from experts you can trust ISOCORP is a Value-Added Reseller (VAR) and services provider for best in class

NFX FOR MSP SOLUTION GUIDE nfx One for Managed Service Providers With netforensics MSP suite of solutions, you can quickly and effectively ramp up customer security offerings and increase your bottom line

The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the

SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the